Skip to main content

Showing 1–8 of 8 results for author: Spolaor, R

Searching in archive cs. Search in all archives.
.
  1. AccEar: Accelerometer Acoustic Eavesdrop** with Unconstrained Vocabulary

    Authors: Pengfei Hu, Hui Zhuang, Panneer Selvam Santhalingamy, Riccardo Spolaor, Parth Pathaky, Guoming Zhang, Xiuzhen Cheng

    Abstract: With the increasing popularity of voice-based applications, acoustic eavesdrop** has become a serious threat to users' privacy. While on smartphones the access to microphones needs an explicit user permission, acoustic eavesdrop** attacks can rely on motion sensors (such as accelerometer and gyroscope), which access is unrestricted. However, previous instances of such attacks can only recogniz… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    Comments: 2022 IEEE Symposium on Security and Privacy (SP)

    Journal ref: 2022 IEEE Symposium on Security and Privacy (SP)

  2. arXiv:2204.08042  [pdf, other

    cs.CR

    BLEWhisperer: Exploiting BLE Advertisements for Data Exfiltration

    Authors: Ankit Gangwal, Shubham Singh, Riccardo Spolaor, Abhijeet Srivastava

    Abstract: Bluetooth technology has enabled short-range wireless communication for billions of devices. Bluetooth Low-Energy (BLE) variant aims at improving power consumption on battery-constrained devices. BLE-enabled devices broadcast information (e.g., as beacons) to nearby devices via advertisements. Unfortunately, such functionality can become a double-edged sword at the hands of attackers. In this pape… ▽ More

    Submitted 23 July, 2022; v1 submitted 17 April, 2022; originally announced April 2022.

    Comments: 20 pages, 8 figures, 1 table

    Journal ref: 27th European Symposium on Research in Computer Security (ESORICS '22), Copenhagen, Denmark, September 26-30, 2022

  3. arXiv:1708.03766  [pdf, other

    cs.CR

    The Dark Side(-Channel) of Mobile Devices: A Survey on Network Traffic Analysis

    Authors: Mauro Conti, QianQian Li, Alberto Maragno, Riccardo Spolaor

    Abstract: In recent years, mobile devices (e.g., smartphones and tablets) have met an increasing commercial success and have become a fundamental element of the everyday life for billions of people all around the world. Mobile devices are used not only for traditional communication activities (e.g., voice calls and messages) but also for more advanced tasks made possible by an enormous amount of multi-purpo… ▽ More

    Submitted 18 June, 2018; v1 submitted 12 August, 2017; originally announced August 2017.

    Comments: 55 pages

  4. arXiv:1704.06099  [pdf, other

    cs.CR cs.NI

    Robust Smartphone App Identification Via Encrypted Network Traffic Analysis

    Authors: Vincent F. Taylor, Riccardo Spolaor, Mauro conti, Ivan Martinovic

    Abstract: The apps installed on a smartphone can reveal much information about a user, such as their medical conditions, sexual orientation, or religious beliefs. Additionally, the presence or absence of particular apps on a smartphone can inform an adversary who is intent on attacking the device. In this paper, we show that a passive eavesdropper can feasibly identify smartphone apps by fingerprinting the… ▽ More

    Submitted 20 April, 2017; originally announced April 2017.

  5. arXiv:1609.02769  [pdf, other

    cs.OH

    DELTA: Data Extraction and Logging Tool for Android

    Authors: Mauro Conti, Elia Dal Santo, Riccardo Spolaor

    Abstract: In the past few years, the use of smartphones has increased exponentially, and so have the capabilities of such devices. Together with an increase in raw processing power, modern smartphones are equipped with a wide variety of sensors and expose an extensive set of API (Accessible Programming Interface). These capabilities allow us to extract a wide spectrum of data that ranges from information ab… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

    Comments: 11 pages, 7 figures

  6. arXiv:1609.02750  [pdf, other

    cs.CR

    No Free Charge Theorem: a Covert Channel via USB Charging Cable on Mobile Devices

    Authors: Riccardo Spolaor, Laila Abudahi, Veelasha Moonsamy, Mauro Conti, Radha Poovendran

    Abstract: More and more people are regularly using mobile and battery-powered handsets, such as smartphones and tablets. At the same time, thanks to the technological innovation and to the high user demands, those devices are integrating extensive functionalities and developers are writing battery-draining apps, which results in a surge of energy consumption of these devices. This scenario leads many people… ▽ More

    Submitted 9 September, 2016; originally announced September 2016.

    Comments: 10 pages, 14 figures

  7. arXiv:1503.00561  [pdf, other

    cs.HC

    CAPTCHaStar! A novel CAPTCHA based on interactive shape discovery

    Authors: Mauro Conti, Claudio Guarisco, Riccardo Spolaor

    Abstract: Over the last years, most websites on which users can register (e.g., email providers and social networks) adopted CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) as a countermeasure against automated attacks. The battle of wits between designers and attackers of CAPTCHAs led to current ones being annoying and hard to solve for users, while still being vulnera… ▽ More

    Submitted 17 December, 2015; v1 submitted 2 March, 2015; originally announced March 2015.

    Comments: 15 pages

  8. arXiv:1407.7844  [pdf, other

    cs.CR

    Can't you hear me knocking: Identification of user actions on Android apps via traffic analysis

    Authors: Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino V. Verde

    Abstract: While smartphone usage become more and more pervasive, people start also asking to which extent such devices can be maliciously exploited as "tracking devices". The concern is not only related to an adversary taking physical or remote control of the device (e.g., via a malicious app), but also to what a passive adversary (without the above capabilities) can observe from the device communications.… ▽ More

    Submitted 29 July, 2014; originally announced July 2014.

    Comments: 12 pages